Documente Academic
Documente Profesional
Documente Cultură
INTRODUCTION
1.1 What is Routing?
In our day to day life, we come across many places where we use
internet or any mode of communication in order to have some data
transferred or to communicate via phone or messaging. There are
numerous examples of such places like schools, offices, workplaces, etc.
where we get to see an interconnected system through which
communication takes place. Suppose a person is at his home and wants
to send a message to his friend living overseas. So he would compose a
message and send through internet. This message travels from the
sender to various in between stages before reaching the receiver.
There are multiple ways in which message can reach the receiver, just
like there are multiple ways for you to go to your school or office.
So the selection of a path from so many alternatives is called
routing and it is achieved by means of a device called router. Routing is
done at many areas including circuit and packet switched networks and
also in transport systems, etc. Routers, switches, gateways are the
intermediate devices which act as nodes and have multiple incoming
and outgoing paths which are selected according to the forwarding
mechanisms.
The study is further explained topic wise with various aspects related to
the subject of concern.
CHAPTER 2
Characteristics of Network and Terms
2.1 Ways of Delivering Messages
2.1.1 Unicast
2.1.2 Multicast
2.1.3 Anycast
The message is sent from the source node across the network to
any number of destination nodes which are particularly
nearer to the source and it takes less amount of cost to
reach in Anycast system.
Fig: 2.3
2.1.4 Geocast
The message is sent from the source node across the network to
destination nodes situated at a particular geographical
location in Geocast system. For example, there
happens an emergency situation like earthquake
or flood that may have cause effect on a specific
geographic area, so message can be sent to
particular geographic location.
Fig: 2.4
2.1.5 Broadcast
Fig: 2.5
The message is sent from the source node across the network to all the
nodes connected to the network irrespective of whether the node has
requested for the data or not in Broadcast system. The channels viewed
by people on television are example of broadcast system because all
the channels are available for the user to use even if the user has
demanded for it or not.
2.2 Network Topologies
In this type, each and every device is connected via point to point link
with a central device which is a hub or a switch. Its advantage over the
mesh topology is the number of links are significantly reduced but the
failure of one link completely puts that device out from communicating
with any other device connected to the network.
In ring topology, each device has point to point connection with only
the two devices on each of its side and signal is passed along the ring in
one direction only from device to device until it reaches the
destination. A ring is relatively easier to install compared to other
topologies. To modify a device, it requires to change couple of
connections as each device is connected only to its two neighbors. But
unidirectional traffic is a disadvantage.
2.4 Links
Links play an important role for connection from router to router.
Information is transferred from one router to the another with the use
of link only. If the link between two routers fail, an alternate path has
to be selected to traverse from one of those two routers to the other
one. So links act as bridge among routers.
2.5 Packet
CHAPTER 3
Qualities for an Efficient Routing System
3.1 Characteristics of a good Network System
3.1.1 Stability and Robustness
There are often situations when the internet connection to our homes
or offices fails due to hardware failures of particular routers that
constitute the path. In such circumstances, Being robust, means that
routers should make internet connection perfect again by diverting to
some different path unless the hardware failure or the unexpected
error is corrected. Because routers are prone to failures due to some
mechanical or physical harm. The evaluation of an algorithm can be
done on the basis of how stable and secure it proves to be in such hard
and fast situations.
3.1.3 Optimality
The factors here that affect communication are number of packets lost,
size of routers, queuing and processing delays, propagation delay, bit-
rate of the links
3.2.2 Path length
The factors here that affect communication are the number of hops,
distance between routers, distance between source and destination,
cost set by the administrator,
3.2.3 Delay
The factors here that affect communication are the amount of time
that the message reaches late to the one who has requested as well as
the amount to time source takes to process and transmit the required
information. It also depends on the bandwidth of the links that are
situated in between two nodes.
3.2.4 Noise
The factors here that affect communication are the external factors
that make the message erroneous like some amplitude changing
factors, undesired signals.
3.2.5 Bandwidth
Algorithms
4.1 Dijkstra’s algorithm:
Each node has full knowledge of whole topology.
Each node calculates shortest path from its node.
Topology change is broadcasted to all nodes via flooding.
In this method, user is needed to enter adjacency matrix to determine
the cost (path).
A loop is used to determine the shortest path is direct or via some
nodes. The minimum path is updated and stored. Finally, we will get
shortest path from all nodes to other nodes.
4.1.1 Advantages:
Finds shortest path in Order of O (E+ V Log(V) ) if we use a
minimum priority queue. E: no. of edges; V: no. of vertex
4.1.2 Disadvantages:
It cannot detect negative cycle.
4.1.3 Application:
Traffic information systems use this algorithm to track specific
destination from given source.
Open Shortest Path First, used in Internet routing.
User will enter the source and destination for which the shortest
path is needed to be calculated.
… (4.1)
4.2.1 Advantages:
It can detect negative cycles which Dijkstra’s algorithm cannot.
4.2.2 Disadvantages:
Since the path is calculated from node to node, the change in
network is not reflected at same instance.
If a link or node fails the other node will try to find alternate path
possible and may result in routing loops.
4.2.3 Applications:
Used to solver linear inequality.
Finding shortest path for routing.
Each node sends its table to all neighboring nodes.
4.3 Floyd-Warshall Algorithm:
Fig: 4.1
The above two algorithm works on single source shortest path and this
algorithm gives all source shortest paths between all nodes in graph.
In the above figure, there are various paths from A to E and in this
algorithm it will consider all types of path and returns shortest path.
It is noticed that each node is considered only once.
The problem arises when we allow a negative edge as it would form a
loop and determines it as shortest path.
It forms a transitive closure matrix which shows all pair shortest path.
Chapter-5
Conclusion
5.1 Conclusion: